John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 1 | // Copyright 2017 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
John Abd-El-Malek | 984dc00 | 2019-05-29 01:26:59 | [diff] [blame] | 5 | #include "content/browser/network_service_instance_impl.h" |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 6 | |
Lukasz Anforowicz | ce4487b7 | 2018-10-23 18:05:53 | [diff] [blame] | 7 | #include <memory> |
| 8 | #include <string> |
| 9 | #include <utility> |
| 10 | |
Felipe Andrade | a9174c6 | 2022-08-16 18:35:11 | [diff] [blame] | 11 | #include "base/base_paths.h" |
Sebastien Marchand | f8cbfab | 2019-01-25 16:02:30 | [diff] [blame] | 12 | #include "base/bind.h" |
Gabriel Charette | f385133 | 2022-04-28 23:39:18 | [diff] [blame] | 13 | #include "base/command_line.h" |
Doug Turner | 0851234 | 2018-09-24 20:54:19 | [diff] [blame] | 14 | #include "base/environment.h" |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 15 | #include "base/feature_list.h" |
Matt Menke | 04db81d | 2020-07-29 21:54:58 | [diff] [blame] | 16 | #include "base/files/file.h" |
Will Harris | b246f67 | 2021-10-28 06:47:13 | [diff] [blame] | 17 | #include "base/files/file_enumerator.h" |
Will Harris | dac11fb | 2021-09-08 02:21:41 | [diff] [blame] | 18 | #include "base/files/file_util.h" |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 19 | #include "base/message_loop/message_pump_type.h" |
Will Harris | dac11fb | 2021-09-08 02:21:41 | [diff] [blame] | 20 | #include "base/metrics/histogram_functions.h" |
Clark DuVall | 984239a | 2019-08-08 23:38:33 | [diff] [blame] | 21 | #include "base/metrics/histogram_macros.h" |
Lukasz Anforowicz | ce4487b7 | 2018-10-23 18:05:53 | [diff] [blame] | 22 | #include "base/no_destructor.h" |
Felipe Andrade | a9174c6 | 2022-08-16 18:35:11 | [diff] [blame] | 23 | #include "base/path_service.h" |
Doug Turner | 0851234 | 2018-09-24 20:54:19 | [diff] [blame] | 24 | #include "base/strings/string_util.h" |
| 25 | #include "base/strings/utf_string_conversions.h" |
Robbie McElrath | 8dc3acc | 2019-08-15 20:43:04 | [diff] [blame] | 26 | #include "base/synchronization/waitable_event.h" |
Patrick Monette | 643cdf6 | 2021-10-15 19:13:42 | [diff] [blame] | 27 | #include "base/task/sequenced_task_runner.h" |
Will Harris | dac11fb | 2021-09-08 02:21:41 | [diff] [blame] | 28 | #include "base/task/thread_pool.h" |
John Abd-El-Malek | 984dc00 | 2019-05-29 01:26:59 | [diff] [blame] | 29 | #include "base/threading/sequence_local_storage_slot.h" |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 30 | #include "base/threading/thread.h" |
Matt Menke | 04db81d | 2020-07-29 21:54:58 | [diff] [blame] | 31 | #include "base/threading/thread_restrictions.h" |
Gabriel Charette | d87f10f | 2022-03-31 00:44:22 | [diff] [blame] | 32 | #include "base/time/time.h" |
Egor Pasko | 75389f1 | 2022-03-22 16:09:11 | [diff] [blame] | 33 | #include "base/trace_event/trace_event.h" |
Doug Turner | 0851234 | 2018-09-24 20:54:19 | [diff] [blame] | 34 | #include "build/build_config.h" |
Yuta Hijikata | d0a8b6b | 2020-11-20 16:36:15 | [diff] [blame] | 35 | #include "build/chromeos_buildflags.h" |
Robbie McElrath | 995a2bf | 2018-11-19 23:21:59 | [diff] [blame] | 36 | #include "content/browser/browser_main_loop.h" |
Will Harris | 7bcc528 | 2022-07-29 00:51:03 | [diff] [blame] | 37 | #include "content/browser/buildflags.h" |
Shuran Huang | 10398150 | 2022-03-28 21:52:18 | [diff] [blame] | 38 | #include "content/browser/first_party_sets/first_party_sets_handler_impl.h" |
Yutaka Hirano | de9868f | 2022-04-27 02:48:44 | [diff] [blame] | 39 | #include "content/browser/net/http_cache_backend_file_operations_factory.h" |
Liza Burakova | 2707060 | 2022-07-01 05:27:40 | [diff] [blame] | 40 | #include "content/browser/net/socket_broker_impl.h" |
Egor Pasko | 75389f1 | 2022-03-22 16:09:11 | [diff] [blame] | 41 | #include "content/browser/network_sandbox_grant_result.h" |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 42 | #include "content/browser/network_service_client.h" |
Eric Seckler | 8652dcd5 | 2018-09-20 10:42:28 | [diff] [blame] | 43 | #include "content/public/browser/browser_task_traits.h" |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 44 | #include "content/public/browser/browser_thread.h" |
| 45 | #include "content/public/browser/content_browser_client.h" |
John Abd-El-Malek | 984dc00 | 2019-05-29 01:26:59 | [diff] [blame] | 46 | #include "content/public/browser/network_service_instance.h" |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 47 | #include "content/public/browser/service_process_host.h" |
Hans Wennborg | 5ffd139 | 2019-10-16 11:00:02 | [diff] [blame] | 48 | #include "content/public/common/content_client.h" |
Yutaka Hirano | 92bdfa2 | 2022-06-01 15:51:33 | [diff] [blame] | 49 | #include "content/public/common/content_features.h" |
Clark DuVall | b9924e9 | 2018-12-10 23:36:33 | [diff] [blame] | 50 | #include "content/public/common/network_service_util.h" |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 51 | #include "mojo/public/cpp/bindings/pending_receiver.h" |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 52 | #include "mojo/public/cpp/bindings/remote.h" |
Yutaka Hirano | de9868f | 2022-04-27 02:48:44 | [diff] [blame] | 53 | #include "mojo/public/cpp/bindings/self_owned_receiver.h" |
| 54 | #include "net/base/features.h" |
Matt Menke | 38662e2 | 2018-08-07 12:18:11 | [diff] [blame] | 55 | #include "net/log/net_log_util.h" |
Liza Burakova | 2707060 | 2022-07-01 05:27:40 | [diff] [blame] | 56 | #include "sandbox/policy/features.h" |
Matthew Denton | 03c45a2 | 2020-06-01 23:40:48 | [diff] [blame] | 57 | #include "services/cert_verifier/cert_verifier_service_factory.h" |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 58 | #include "services/cert_verifier/public/mojom/cert_verifier_service_factory.mojom.h" |
John Abd-El-Malek | 8e82a32 | 2018-01-31 20:30:47 | [diff] [blame] | 59 | #include "services/network/network_service.h" |
Yutaka Hirano | d8789f9 | 2018-01-30 09:59:51 | [diff] [blame] | 60 | #include "services/network/public/cpp/features.h" |
Matt Menke | 38662e2 | 2018-08-07 12:18:11 | [diff] [blame] | 61 | #include "services/network/public/cpp/network_switches.h" |
Matt Menke | 55a16f0 | 2018-10-09 23:07:53 | [diff] [blame] | 62 | #include "services/network/public/mojom/net_log.mojom.h" |
Robbie McElrath | f572f527 | 2018-08-17 21:21:42 | [diff] [blame] | 63 | #include "services/network/public/mojom/network_change_manager.mojom.h" |
Hans Wennborg | 78b5218 | 2021-06-15 13:42:15 | [diff] [blame] | 64 | #include "services/network/public/mojom/network_context.mojom.h" |
Etienne Pierre-doray | 0df4474a | 2019-10-16 14:56:39 | [diff] [blame] | 65 | #include "services/network/public/mojom/network_service.mojom.h" |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 66 | #include "services/network/public/mojom/network_service_test.mojom.h" |
Liza Burakova | 2707060 | 2022-07-01 05:27:40 | [diff] [blame] | 67 | #include "services/network/public/mojom/socket_broker.mojom.h" |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 68 | |
Egor Pasko | 75389f1 | 2022-03-22 16:09:11 | [diff] [blame] | 69 | #if !BUILDFLAG(IS_ANDROID) |
| 70 | #include "content/browser/network_sandbox.h" |
| 71 | #endif |
Will Harris | 1967f844 | 2021-02-05 20:34:22 | [diff] [blame] | 72 | |
Will Harris | f26ad34 | 2022-09-06 02:03:28 | [diff] [blame] | 73 | #if BUILDFLAG(IS_WIN) |
| 74 | #include "content/browser/net/network_service_process_tracker_win.h" |
| 75 | #endif |
| 76 | |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 77 | namespace content { |
| 78 | |
| 79 | namespace { |
| 80 | |
Xiaohan Wang | 1ecfd00 | 2022-01-19 22:33:10 | [diff] [blame] | 81 | #if BUILDFLAG(IS_POSIX) |
Robbie McElrath | fa25a7c | 2019-03-13 17:54:36 | [diff] [blame] | 82 | // Environment variable pointing to credential cache file. |
| 83 | constexpr char kKrb5CCEnvName[] = "KRB5CCNAME"; |
| 84 | // Environment variable pointing to Kerberos config file. |
| 85 | constexpr char kKrb5ConfEnvName[] = "KRB5_CONFIG"; |
| 86 | #endif |
| 87 | |
Felipe Andrade | a9174c6 | 2022-08-16 18:35:11 | [diff] [blame] | 88 | #if BUILDFLAG(IS_CHROMEOS_LACROS) |
| 89 | constexpr char kKrb5CCFilePrefix[] = "FILE:"; |
| 90 | constexpr char kKrb5Directory[] = "kerberos"; |
| 91 | constexpr char kKrb5CCFile[] = "krb5cc"; |
| 92 | constexpr char kKrb5ConfFile[] = "krb5.conf"; |
| 93 | #endif // BUILDFLAG(IS_CHROMEOS_LACROS) |
| 94 | |
John Abd-El-Malek | 984dc00 | 2019-05-29 01:26:59 | [diff] [blame] | 95 | bool g_force_create_network_service_directly = false; |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 96 | mojo::Remote<network::mojom::NetworkService>* g_network_service_remote = |
| 97 | nullptr; |
Robbie McElrath | f961dc5 | 2018-08-08 21:29:26 | [diff] [blame] | 98 | network::NetworkConnectionTracker* g_network_connection_tracker; |
Clark DuVall | b026e58 | 2019-07-31 19:50:38 | [diff] [blame] | 99 | bool g_network_service_is_responding = false; |
| 100 | base::Time g_last_network_service_crash; |
John Abd-El-Malek | 984dc00 | 2019-05-29 01:26:59 | [diff] [blame] | 101 | |
Will Harris | b246f67 | 2021-10-28 06:47:13 | [diff] [blame] | 102 | // A directory name that is created below the http cache path and passed to the |
| 103 | // network context when creating a network context with cache enabled. |
| 104 | // This must be a directory below the main cache path so operations such as |
| 105 | // resetting the cache via HttpCacheParams.reset_cache can function correctly |
| 106 | // as they rely on having access to the parent directory of the cache. |
| 107 | const base::FilePath::CharType kCacheDataDirectoryName[] = |
| 108 | FILE_PATH_LITERAL("Cache_Data"); |
| 109 | |
John Abd-El-Malek | 984dc00 | 2019-05-29 01:26:59 | [diff] [blame] | 110 | std::unique_ptr<network::NetworkService>& GetLocalNetworkService() { |
Avi Drissman | ded7717 | 2021-07-02 18:23:00 | [diff] [blame] | 111 | static base::SequenceLocalStorageSlot< |
| 112 | std::unique_ptr<network::NetworkService>> |
John Abd-El-Malek | 984dc00 | 2019-05-29 01:26:59 | [diff] [blame] | 113 | service; |
Avi Drissman | ded7717 | 2021-07-02 18:23:00 | [diff] [blame] | 114 | return service.GetOrCreateValue(); |
John Abd-El-Malek | 984dc00 | 2019-05-29 01:26:59 | [diff] [blame] | 115 | } |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 116 | |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 117 | // If this feature is enabled, the Network Service will run on its own thread |
| 118 | // when running in-process; otherwise it will run on the IO thread. |
| 119 | // |
| 120 | // On Chrome OS, the Network Service must run on the IO thread because |
| 121 | // ProfileIOData and NetworkContext both try to set up NSS, which has to be |
| 122 | // called from the IO thread. |
| 123 | const base::Feature kNetworkServiceDedicatedThread { |
| 124 | "NetworkServiceDedicatedThread", |
Michael Ershov | cbdb820 | 2022-02-21 19:17:01 | [diff] [blame] | 125 | #if BUILDFLAG(IS_CHROMEOS) |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 126 | base::FEATURE_DISABLED_BY_DEFAULT |
| 127 | #else |
| 128 | base::FEATURE_ENABLED_BY_DEFAULT |
| 129 | #endif |
| 130 | }; |
| 131 | |
| 132 | base::Thread& GetNetworkServiceDedicatedThread() { |
| 133 | static base::NoDestructor<base::Thread> thread{"NetworkService"}; |
John Abd-El-Malek | a5fe84b | 2022-03-18 01:05:29 | [diff] [blame] | 134 | DCHECK(base::FeatureList::IsEnabled(kNetworkServiceDedicatedThread)); |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 135 | return *thread; |
| 136 | } |
| 137 | |
Ken Rockot | 7ff141d | 2019-11-01 21:09:44 | [diff] [blame] | 138 | // The instance NetworkService used when hosting the service in-process. This is |
| 139 | // set up by |CreateInProcessNetworkServiceOnThread()| and destroyed by |
| 140 | // |ShutDownNetworkService()|. |
| 141 | network::NetworkService* g_in_process_instance = nullptr; |
| 142 | |
Dave Tapuska | 69f8925 | 2021-03-10 17:11:37 | [diff] [blame] | 143 | static NetworkServiceClient* g_client = nullptr; |
| 144 | |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 145 | void CreateInProcessNetworkServiceOnThread( |
| 146 | mojo::PendingReceiver<network::mojom::NetworkService> receiver) { |
| 147 | // The test interface doesn't need to be implemented in the in-process case. |
| 148 | auto registry = std::make_unique<service_manager::BinderRegistry>(); |
Daniel Cheng | b7b2f5b | 2021-09-25 21:37:19 | [diff] [blame] | 149 | registry->AddInterface(base::BindRepeating( |
| 150 | [](mojo::PendingReceiver<network::mojom::NetworkServiceTest>) {})); |
Scott Sheehan | 8e1d03ce | 2019-11-05 16:11:15 | [diff] [blame] | 151 | g_in_process_instance = new network::NetworkService( |
| 152 | std::move(registry), std::move(receiver), |
| 153 | true /* delay_initialization_until_set_client */); |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 154 | } |
| 155 | |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 156 | // A utility function to make it clear what behavior is expected by the network |
| 157 | // context instance depending on the various errors that can happen during data |
| 158 | // migration. |
| 159 | // |
Kevin Marshall | 4bdfa5df | 2022-03-21 22:33:27 | [diff] [blame] | 160 | // If this function returns 'true' then the `data_directory` should be used (if |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 161 | // specified in the network context params). If this function returns 'false' |
| 162 | // then the `unsandboxed_data_path` should be used. |
| 163 | bool IsSafeToUseDataPath(SandboxGrantResult result) { |
| 164 | switch (result) { |
| 165 | case SandboxGrantResult::kSuccess: |
| 166 | // A migration occurred, and it was successful. |
| 167 | return true; |
| 168 | case SandboxGrantResult::kFailedToGrantSandboxAccessToCache: |
| 169 | case SandboxGrantResult::kFailedToCreateCacheDirectory: |
| 170 | // A failure to grant create or grant access to the cache dir does not |
Kevin Marshall | 4bdfa5df | 2022-03-21 22:33:27 | [diff] [blame] | 171 | // affect the providence of the data contained in `data_directory` as the |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 172 | // migration could have still occurred. |
| 173 | // |
| 174 | // These cases are handled internally and so this case should never be |
| 175 | // hit. It is undefined behavior to proceed in this case so CHECK here. |
| 176 | IMMEDIATE_CRASH(); |
| 177 | return false; |
| 178 | case SandboxGrantResult::kFailedToCreateDataDirectory: |
Kevin Marshall | 4bdfa5df | 2022-03-21 22:33:27 | [diff] [blame] | 179 | // A failure to create the `data_directory` is fatal, and the |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 180 | // `unsandboxed_data_path` should be used. |
| 181 | return false; |
| 182 | case SandboxGrantResult::kFailedToCopyData: |
| 183 | // A failure to copy the data from `unsandboxed_data_path` to the |
Kevin Marshall | 4bdfa5df | 2022-03-21 22:33:27 | [diff] [blame] | 184 | // `data_directory` is fatal, and the `unsandboxed_data_path` should be |
| 185 | // used. |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 186 | return false; |
| 187 | case SandboxGrantResult::kFailedToDeleteOldData: |
| 188 | // This is not fatal, as the new data has been correctly migrated, and the |
| 189 | // deletion will be retried at a later time. |
| 190 | return true; |
| 191 | case SandboxGrantResult::kFailedToGrantSandboxAccessToData: |
| 192 | // If the sandbox could not be granted access to the new data dir, then |
| 193 | // don't attempt to migrate. This means that the old |
| 194 | // `unsandboxed_data_path` should be used. |
| 195 | return false; |
| 196 | case SandboxGrantResult::kDidNotAttemptToGrantSandboxAccess: |
| 197 | // No migration was attempted either because of platform constraints or |
| 198 | // because the network context had no valid data paths (e.g. in-memory or |
Kevin Marshall | 4bdfa5df | 2022-03-21 22:33:27 | [diff] [blame] | 199 | // incognito), or `unsandboxed_data_path` was not specified. |
| 200 | // `data_directory` should be used in this case (if present). |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 201 | return true; |
| 202 | case SandboxGrantResult::kFailedToCreateCheckpointFile: |
| 203 | // This is fatal, as a failure to create the checkpoint file means that |
| 204 | // the next time the same network context is used, the data in |
Kevin Marshall | 4bdfa5df | 2022-03-21 22:33:27 | [diff] [blame] | 205 | // `unsandboxed_data_path` will be re-copied to the new `data_directory` |
| 206 | // and thus any changes to the data will be discarded. So in this case, |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 207 | // `unsandboxed_data_path` should be used. |
| 208 | return false; |
| 209 | case SandboxGrantResult::kNoMigrationRequested: |
| 210 | // The caller supplied an `unsandboxed_data_path` but did not trigger a |
| 211 | // migration so the data should be read from the `unsandboxed_data_path`. |
| 212 | return false; |
| 213 | case SandboxGrantResult::kMigrationAlreadySucceeded: |
Kevin Marshall | 4bdfa5df | 2022-03-21 22:33:27 | [diff] [blame] | 214 | // Migration has already taken place, so `data_directory` contains the |
| 215 | // valid data. |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 216 | return true; |
| 217 | case SandboxGrantResult::kMigrationAlreadySucceededWithNoAccess: |
| 218 | // If the sandbox could not be granted access to the new data dir, but the |
Kevin Marshall | 4bdfa5df | 2022-03-21 22:33:27 | [diff] [blame] | 219 | // migration has already happened to `data_directory`. This means that the |
| 220 | // sandbox might not have access to the data but `data_directory` should |
| 221 | // still be used because it's been migrated. |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 222 | return true; |
| 223 | } |
| 224 | } |
| 225 | |
Will Harris | b246f67 | 2021-10-28 06:47:13 | [diff] [blame] | 226 | // Takes a cache dir and deletes all files in it except those in 'Cache_Data' |
| 227 | // directory. This can be removed once all caches have been moved to the new |
| 228 | // sub-directory, around M99. |
| 229 | void MaybeDeleteOldCache(const base::FilePath& cache_dir) { |
| 230 | bool deleted_old_files = false; |
| 231 | base::FileEnumerator enumerator( |
| 232 | cache_dir, /*recursive=*/false, |
| 233 | base::FileEnumerator::FILES | base::FileEnumerator::DIRECTORIES); |
| 234 | |
| 235 | for (auto name = enumerator.Next(); !name.empty(); name = enumerator.Next()) { |
| 236 | base::FileEnumerator::FileInfo info = enumerator.GetInfo(); |
| 237 | DCHECK_EQ(info.GetName(), name.BaseName()); |
| 238 | |
| 239 | if (info.IsDirectory()) { |
| 240 | if (name.BaseName().value() == kCacheDataDirectoryName) |
| 241 | continue; |
| 242 | } |
| 243 | base::DeletePathRecursively(name); |
| 244 | deleted_old_files = true; |
| 245 | } |
| 246 | |
| 247 | base::UmaHistogramBoolean("NetworkService.DeletedOldCacheData", |
| 248 | deleted_old_files); |
| 249 | } |
| 250 | |
Will Harris | dac11fb | 2021-09-08 02:21:41 | [diff] [blame] | 251 | void CreateNetworkContextInternal( |
| 252 | mojo::PendingReceiver<network::mojom::NetworkContext> context, |
| 253 | network::mojom::NetworkContextParamsPtr params, |
| 254 | SandboxGrantResult grant_access_result) { |
Egor Pasko | 75389f1 | 2022-03-22 16:09:11 | [diff] [blame] | 255 | TRACE_EVENT0("loading", "CreateNetworkContextInternal"); |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 256 | // These two histograms are logged from elsewhere, so don't log them twice. |
| 257 | DCHECK(grant_access_result != |
| 258 | SandboxGrantResult::kFailedToCreateCacheDirectory); |
| 259 | DCHECK(grant_access_result != |
| 260 | SandboxGrantResult::kFailedToGrantSandboxAccessToCache); |
Will Harris | dac11fb | 2021-09-08 02:21:41 | [diff] [blame] | 261 | base::UmaHistogramEnumeration("NetworkService.GrantSandboxResult", |
| 262 | grant_access_result); |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 263 | |
| 264 | if (grant_access_result != SandboxGrantResult::kSuccess && |
| 265 | grant_access_result != |
| 266 | SandboxGrantResult::kDidNotAttemptToGrantSandboxAccess && |
| 267 | grant_access_result != SandboxGrantResult::kNoMigrationRequested && |
| 268 | grant_access_result != SandboxGrantResult::kMigrationAlreadySucceeded) { |
| 269 | PLOG(ERROR) << "Encountered error while migrating network context data or " |
| 270 | "granting sandbox access for " |
Kevin Marshall | eece67f | 2022-03-30 20:30:04 | [diff] [blame] | 271 | << (params->file_paths |
| 272 | ? params->file_paths->data_directory.path() |
| 273 | : base::FilePath()) |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 274 | << ". Result: " << static_cast<int>(grant_access_result); |
| 275 | } |
| 276 | |
| 277 | if (!IsSafeToUseDataPath(grant_access_result)) { |
Kevin Marshall | 4bdfa5df | 2022-03-21 22:33:27 | [diff] [blame] | 278 | // Unsafe to use new `data_directory`. This means that a migration was |
| 279 | // attempted, and `unsandboxed_data_path` contains the still-valid set of |
| 280 | // data. Swap the parameters to instruct the network service to use this |
| 281 | // path for the network context. This of course will mean that if the |
| 282 | // network service is running sandboxed then this data might not be |
| 283 | // accessible, but does provide a pathway to user recovery, as the sandbox |
| 284 | // can just be disabled in this case. |
Will Harris | 3d6f9e4c | 2021-09-17 19:11:16 | [diff] [blame] | 285 | DCHECK(params->file_paths->unsandboxed_data_path.has_value()); |
Kevin Marshall | 4bdfa5df | 2022-03-21 22:33:27 | [diff] [blame] | 286 | params->file_paths->data_directory = |
| 287 | *params->file_paths->unsandboxed_data_path; |
Will Harris | dac11fb | 2021-09-08 02:21:41 | [diff] [blame] | 288 | } |
Kevin Marshall | eece67f | 2022-03-30 20:30:04 | [diff] [blame] | 289 | |
| 290 | if (network::TransferableDirectory::IsOpenForTransferRequired()) { |
| 291 | if (params->file_paths) { |
| 292 | params->file_paths->data_directory.OpenForTransfer(); |
| 293 | } |
| 294 | if (params->http_cache_directory) { |
| 295 | params->http_cache_directory->OpenForTransfer(); |
| 296 | } |
Will Harris | b246f67 | 2021-10-28 06:47:13 | [diff] [blame] | 297 | } |
Kevin Marshall | eece67f | 2022-03-30 20:30:04 | [diff] [blame] | 298 | |
Will Harris | 78ccb55 | 2022-09-08 05:40:48 | [diff] [blame] | 299 | // This might recreate g_client if the network service needed to be restarted. |
| 300 | auto* network_service = GetNetworkService(); |
| 301 | |
| 302 | #if BUILDFLAG(USE_SOCKET_BROKER) |
| 303 | if (GetContentClient()->browser()->ShouldSandboxNetworkService() && |
| 304 | !params->socket_broker) { |
| 305 | params->socket_broker = g_client->BindSocketBroker(); |
| 306 | } |
| 307 | #endif // BUILDFLAG(USE_SOCKET_BROKER) |
| 308 | |
| 309 | network_service->CreateNetworkContext(std::move(context), std::move(params)); |
Will Harris | dac11fb | 2021-09-08 02:21:41 | [diff] [blame] | 310 | } |
| 311 | |
Alexander Timin | 7ab3ed8 | 2020-01-13 20:00:13 | [diff] [blame] | 312 | scoped_refptr<base::SequencedTaskRunner>& GetNetworkTaskRunnerStorage() { |
| 313 | static base::NoDestructor<scoped_refptr<base::SequencedTaskRunner>> storage; |
| 314 | return *storage; |
| 315 | } |
| 316 | |
Felipe Andrade | a9174c6 | 2022-08-16 18:35:11 | [diff] [blame] | 317 | #if BUILDFLAG(IS_CHROMEOS_LACROS) |
| 318 | base::FilePath GetKerberosDir() { |
| 319 | base::FilePath dir; |
| 320 | base::PathService::Get(base::DIR_HOME, &dir); |
| 321 | return dir.Append(kKrb5Directory); |
| 322 | } |
| 323 | |
| 324 | std::string GetKrb5CCEnvValue() { |
| 325 | return kKrb5CCFilePrefix + GetKerberosDir().Append(kKrb5CCFile).value(); |
| 326 | } |
| 327 | |
| 328 | std::string GetKrb5ConfEnvValue() { |
| 329 | return GetKerberosDir().Append(kKrb5ConfFile).value(); |
| 330 | } |
| 331 | #endif // BUILDFLAG(IS_CHROMEOS_LACROS) |
| 332 | |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 333 | void CreateInProcessNetworkService( |
| 334 | mojo::PendingReceiver<network::mojom::NetworkService> receiver) { |
Egor Pasko | 75389f1 | 2022-03-22 16:09:11 | [diff] [blame] | 335 | TRACE_EVENT0("loading", "CreateInProcessNetworkService"); |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 336 | scoped_refptr<base::SingleThreadTaskRunner> task_runner; |
John Abd-El-Malek | a5fe84b | 2022-03-18 01:05:29 | [diff] [blame] | 337 | if (base::FeatureList::IsEnabled(kNetworkServiceDedicatedThread)) { |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 338 | base::Thread::Options options(base::MessagePumpType::IO, 0); |
Olivier Li | 89911c4 | 2021-07-02 21:27:02 | [diff] [blame] | 339 | GetNetworkServiceDedicatedThread().StartWithOptions(std::move(options)); |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 340 | task_runner = GetNetworkServiceDedicatedThread().task_runner(); |
| 341 | } else { |
Gabriel Charette | e7cdc5cd | 2020-05-27 23:35:05 | [diff] [blame] | 342 | task_runner = GetIOThreadTaskRunner({}); |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 343 | } |
| 344 | |
Alexander Timin | 7ab3ed8 | 2020-01-13 20:00:13 | [diff] [blame] | 345 | GetNetworkTaskRunnerStorage() = std::move(task_runner); |
| 346 | |
| 347 | GetNetworkTaskRunner()->PostTask( |
| 348 | FROM_HERE, base::BindOnce(&CreateInProcessNetworkServiceOnThread, |
| 349 | std::move(receiver))); |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 350 | } |
| 351 | |
John Abd-El-Malek | d1e2a1c | 2019-02-28 20:01:03 | [diff] [blame] | 352 | network::mojom::NetworkServiceParamsPtr CreateNetworkServiceParams() { |
| 353 | network::mojom::NetworkServiceParamsPtr network_service_params = |
| 354 | network::mojom::NetworkServiceParams::New(); |
| 355 | network_service_params->initial_connection_type = |
| 356 | network::mojom::ConnectionType( |
| 357 | net::NetworkChangeNotifier::GetConnectionType()); |
| 358 | network_service_params->initial_connection_subtype = |
| 359 | network::mojom::ConnectionSubtype( |
| 360 | net::NetworkChangeNotifier::GetConnectionSubtype()); |
Dave Tapuska | 69f8925 | 2021-03-10 17:11:37 | [diff] [blame] | 361 | network_service_params->default_observer = |
| 362 | g_client->BindURLLoaderNetworkServiceObserver(); |
Kirubel Aklilu | 60d316f | 2021-12-16 01:55:33 | [diff] [blame] | 363 | network_service_params->first_party_sets_enabled = |
| 364 | GetContentClient()->browser()->IsFirstPartySetsEnabled(); |
| 365 | |
Xiaohan Wang | 1ecfd00 | 2022-01-19 22:33:10 | [diff] [blame] | 366 | #if BUILDFLAG(IS_POSIX) |
Robbie McElrath | fa25a7c | 2019-03-13 17:54:36 | [diff] [blame] | 367 | // Send Kerberos environment variables to the network service. |
| 368 | if (IsOutOfProcessNetworkService()) { |
Felipe Andrade | a9174c6 | 2022-08-16 18:35:11 | [diff] [blame] | 369 | #if BUILDFLAG(IS_CHROMEOS_LACROS) |
| 370 | network_service_params->environment.push_back( |
| 371 | network::mojom::EnvironmentVariable::New(kKrb5CCEnvName, |
| 372 | GetKrb5CCEnvValue())); |
| 373 | network_service_params->environment.push_back( |
| 374 | network::mojom::EnvironmentVariable::New(kKrb5ConfEnvName, |
| 375 | GetKrb5ConfEnvValue())); |
| 376 | #else |
Robbie McElrath | fa25a7c | 2019-03-13 17:54:36 | [diff] [blame] | 377 | std::unique_ptr<base::Environment> env(base::Environment::Create()); |
| 378 | std::string value; |
| 379 | if (env->HasVar(kKrb5CCEnvName)) { |
| 380 | env->GetVar(kKrb5CCEnvName, &value); |
| 381 | network_service_params->environment.push_back( |
| 382 | network::mojom::EnvironmentVariable::New(kKrb5CCEnvName, value)); |
| 383 | } |
| 384 | if (env->HasVar(kKrb5ConfEnvName)) { |
| 385 | env->GetVar(kKrb5ConfEnvName, &value); |
| 386 | network_service_params->environment.push_back( |
| 387 | network::mojom::EnvironmentVariable::New(kKrb5ConfEnvName, value)); |
| 388 | } |
Felipe Andrade | a9174c6 | 2022-08-16 18:35:11 | [diff] [blame] | 389 | #endif // BUILDFLAG(IS_CHROMEOS_LACROS) |
Robbie McElrath | fa25a7c | 2019-03-13 17:54:36 | [diff] [blame] | 390 | } |
Felipe Andrade | a9174c6 | 2022-08-16 18:35:11 | [diff] [blame] | 391 | #endif // BUILDFLAG(IS_POSIX) |
John Abd-El-Malek | d1e2a1c | 2019-02-28 20:01:03 | [diff] [blame] | 392 | return network_service_params; |
| 393 | } |
| 394 | |
Robbie McElrath | 8dc3acc | 2019-08-15 20:43:04 | [diff] [blame] | 395 | void CreateNetworkServiceOnIOForTesting( |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 396 | mojo::PendingReceiver<network::mojom::NetworkService> receiver, |
Robbie McElrath | 8dc3acc | 2019-08-15 20:43:04 | [diff] [blame] | 397 | base::WaitableEvent* completion_event) { |
John Abd-El-Malek | 984dc00 | 2019-05-29 01:26:59 | [diff] [blame] | 398 | if (GetLocalNetworkService()) { |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 399 | GetLocalNetworkService()->Bind(std::move(receiver)); |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 400 | return; |
| 401 | } |
| 402 | |
Etienne Pierre-doray | 0df4474a | 2019-10-16 14:56:39 | [diff] [blame] | 403 | GetLocalNetworkService() = std::make_unique<network::NetworkService>( |
| 404 | nullptr /* registry */, std::move(receiver), |
| 405 | true /* delay_initialization_until_set_client */); |
| 406 | GetLocalNetworkService()->Initialize( |
| 407 | network::mojom::NetworkServiceParams::New(), |
| 408 | true /* mock_network_change_notifier */); |
Robbie McElrath | 8dc3acc | 2019-08-15 20:43:04 | [diff] [blame] | 409 | if (completion_event) |
| 410 | completion_event->Signal(); |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 411 | } |
| 412 | |
Gyuyoung Kim | 5f3bd420 | 2019-09-27 01:59:49 | [diff] [blame] | 413 | void BindNetworkChangeManagerReceiver( |
| 414 | mojo::PendingReceiver<network::mojom::NetworkChangeManager> receiver) { |
| 415 | GetNetworkService()->GetNetworkChangeManager(std::move(receiver)); |
Robbie McElrath | f572f527 | 2018-08-17 21:21:42 | [diff] [blame] | 416 | } |
| 417 | |
Fabrice de Gans-Riberi | d82d122 | 2021-03-22 22:23:11 | [diff] [blame] | 418 | base::RepeatingClosureList& GetCrashHandlersList() { |
| 419 | static base::NoDestructor<base::RepeatingClosureList> s_list; |
Lukasz Anforowicz | c195e91 | 2018-10-30 16:20:54 | [diff] [blame] | 420 | return *s_list; |
Lukasz Anforowicz | ce4487b7 | 2018-10-23 18:05:53 | [diff] [blame] | 421 | } |
| 422 | |
| 423 | void OnNetworkServiceCrash() { |
| 424 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 425 | DCHECK(g_network_service_remote); |
| 426 | DCHECK(g_network_service_remote->is_bound()); |
| 427 | DCHECK(!g_network_service_remote->is_connected()); |
Clark DuVall | b026e58 | 2019-07-31 19:50:38 | [diff] [blame] | 428 | g_last_network_service_crash = base::Time::Now(); |
Lukasz Anforowicz | c195e91 | 2018-10-30 16:20:54 | [diff] [blame] | 429 | GetCrashHandlersList().Notify(); |
Lukasz Anforowicz | ce4487b7 | 2018-10-23 18:05:53 | [diff] [blame] | 430 | } |
| 431 | |
Eric Roman | c03b6262 | 2019-06-25 02:13:22 | [diff] [blame] | 432 | // Parses the desired granularity of NetLog capturing specified by the command |
| 433 | // line. |
| 434 | net::NetLogCaptureMode GetNetCaptureModeFromCommandLine( |
| 435 | const base::CommandLine& command_line) { |
| 436 | base::StringPiece switch_name = network::switches::kNetLogCaptureMode; |
| 437 | |
| 438 | if (command_line.HasSwitch(switch_name)) { |
| 439 | std::string value = command_line.GetSwitchValueASCII(switch_name); |
| 440 | |
| 441 | if (value == "Default") |
Eric Roman | 3124cde | 2019-07-10 22:26:15 | [diff] [blame] | 442 | return net::NetLogCaptureMode::kDefault; |
| 443 | if (value == "IncludeSensitive") |
| 444 | return net::NetLogCaptureMode::kIncludeSensitive; |
| 445 | if (value == "Everything") |
| 446 | return net::NetLogCaptureMode::kEverything; |
| 447 | |
| 448 | // Warn when using the old command line switches. |
| 449 | if (value == "IncludeCookiesAndCredentials") { |
| 450 | LOG(ERROR) << "Deprecated value for --" << switch_name |
| 451 | << ". Use IncludeSensitive instead"; |
| 452 | return net::NetLogCaptureMode::kIncludeSensitive; |
| 453 | } |
| 454 | if (value == "IncludeSocketBytes") { |
| 455 | LOG(ERROR) << "Deprecated value for --" << switch_name |
| 456 | << ". Use Everything instead"; |
| 457 | return net::NetLogCaptureMode::kEverything; |
| 458 | } |
Eric Roman | c03b6262 | 2019-06-25 02:13:22 | [diff] [blame] | 459 | |
| 460 | LOG(ERROR) << "Unrecognized value for --" << switch_name; |
| 461 | } |
| 462 | |
Eric Roman | 3124cde | 2019-07-10 22:26:15 | [diff] [blame] | 463 | return net::NetLogCaptureMode::kDefault; |
Eric Roman | c03b6262 | 2019-06-25 02:13:22 | [diff] [blame] | 464 | } |
| 465 | |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 466 | } // namespace |
| 467 | |
Matt Menke | 04db81d | 2020-07-29 21:54:58 | [diff] [blame] | 468 | class NetworkServiceInstancePrivate { |
| 469 | public: |
| 470 | // Opens the specified file, blocking until the file is open. Used to open |
| 471 | // files specified by network::switches::kLogNetLog or |
| 472 | // network::switches::kSSLKeyLogFile. Since these arguments can be used to |
| 473 | // debug startup behavior, asynchronously opening the file on another thread |
| 474 | // would result in losing data, hence the need for blocking open operations. |
| 475 | // |file_flags| specifies the flags passed to the base::File constructor call. |
| 476 | // |
| 477 | // ThreadRestrictions needs to be able to friend the class/method to allow |
| 478 | // blocking, but can't friend CONTENT_EXPORT methods, so have it friend |
| 479 | // NetworkServiceInstancePrivate instead of GetNetworkService(). |
| 480 | static base::File BlockingOpenFile(const base::FilePath& path, |
| 481 | int file_flags) { |
| 482 | base::ScopedAllowBlocking allow_blocking; |
| 483 | return base::File(path, file_flags); |
| 484 | } |
| 485 | }; |
| 486 | |
John Abd-El-Malek | 53670dd | 2018-01-18 22:07:21 | [diff] [blame] | 487 | network::mojom::NetworkService* GetNetworkService() { |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 488 | if (!g_network_service_remote) |
| 489 | g_network_service_remote = new mojo::Remote<network::mojom::NetworkService>; |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 490 | if (!g_network_service_remote->is_bound() || |
| 491 | !g_network_service_remote->is_connected()) { |
Matt Menke | 080a917 | 2020-01-31 10:44:08 | [diff] [blame] | 492 | bool service_was_bound = g_network_service_remote->is_bound(); |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 493 | g_network_service_remote->reset(); |
John Abd-El-Malek | 1ae9dbb | 2019-03-04 23:40:47 | [diff] [blame] | 494 | if (GetContentClient()->browser()->IsShuttingDown()) { |
| 495 | // This happens at system shutdown, since in other scenarios the network |
| 496 | // process would only be torn down once the message loop stopped running. |
Oleh Lamzin | 0e22857 | 2019-12-06 16:46:09 | [diff] [blame] | 497 | // We don't want to start the network service again so just create message |
| 498 | // pipe that's not bound to stop consumers from requesting creation of the |
| 499 | // service. |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 500 | auto receiver = g_network_service_remote->BindNewPipeAndPassReceiver(); |
| 501 | auto leaked_pipe = receiver.PassPipe().release(); |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 502 | } else { |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 503 | if (!g_force_create_network_service_directly) { |
| 504 | mojo::PendingReceiver<network::mojom::NetworkService> receiver = |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 505 | g_network_service_remote->BindNewPipeAndPassReceiver(); |
| 506 | g_network_service_remote->set_disconnect_handler( |
John Abd-El-Malek | 1ae9dbb | 2019-03-04 23:40:47 | [diff] [blame] | 507 | base::BindOnce(&OnNetworkServiceCrash)); |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 508 | if (IsInProcessNetworkService()) { |
| 509 | CreateInProcessNetworkService(std::move(receiver)); |
| 510 | } else { |
Matt Menke | 080a917 | 2020-01-31 10:44:08 | [diff] [blame] | 511 | if (service_was_bound) |
| 512 | LOG(ERROR) << "Network service crashed, restarting service."; |
Jan Wilken Dörrie | 2c470ea | 2021-03-22 22:26:24 | [diff] [blame] | 513 | ServiceProcessHost::Launch(std::move(receiver), |
| 514 | ServiceProcessHost::Options() |
| 515 | .WithDisplayName(u"Network Service") |
| 516 | .Pass()); |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 517 | } |
John Abd-El-Malek | 1ae9dbb | 2019-03-04 23:40:47 | [diff] [blame] | 518 | } else { |
Robbie McElrath | 8dc3acc | 2019-08-15 20:43:04 | [diff] [blame] | 519 | // This should only be reached in unit tests. |
| 520 | if (BrowserThread::CurrentlyOn(BrowserThread::IO)) { |
| 521 | CreateNetworkServiceOnIOForTesting( |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 522 | g_network_service_remote->BindNewPipeAndPassReceiver(), |
Robbie McElrath | 8dc3acc | 2019-08-15 20:43:04 | [diff] [blame] | 523 | /*completion_event=*/nullptr); |
| 524 | } else { |
| 525 | base::WaitableEvent event; |
Gabriel Charette | e7cdc5cd | 2020-05-27 23:35:05 | [diff] [blame] | 526 | GetIOThreadTaskRunner({})->PostTask( |
| 527 | FROM_HERE, |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 528 | base::BindOnce( |
| 529 | CreateNetworkServiceOnIOForTesting, |
| 530 | g_network_service_remote->BindNewPipeAndPassReceiver(), |
| 531 | base::Unretained(&event))); |
Robbie McElrath | 8dc3acc | 2019-08-15 20:43:04 | [diff] [blame] | 532 | event.Wait(); |
| 533 | } |
John Abd-El-Malek | 1ae9dbb | 2019-03-04 23:40:47 | [diff] [blame] | 534 | } |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 535 | |
Dave Tapuska | 69f8925 | 2021-03-10 17:11:37 | [diff] [blame] | 536 | delete g_client; // In case we're recreating the network service. |
| 537 | g_client = new NetworkServiceClient(); |
| 538 | |
John Abd-El-Malek | 1ae9dbb | 2019-03-04 23:40:47 | [diff] [blame] | 539 | // Call SetClient before creating NetworkServiceClient, as the latter |
| 540 | // might make requests to NetworkService that depend on initialization. |
Dave Tapuska | 69f8925 | 2021-03-10 17:11:37 | [diff] [blame] | 541 | (*g_network_service_remote)->SetParams(CreateNetworkServiceParams()); |
Yutaka Hirano | 136bd91 | 2022-01-31 16:26:11 | [diff] [blame] | 542 | g_client->OnNetworkServiceInitialized(g_network_service_remote->get()); |
| 543 | |
Clark DuVall | b026e58 | 2019-07-31 19:50:38 | [diff] [blame] | 544 | g_network_service_is_responding = false; |
Jan Wilken Dörrie | 8c74db02 | 2020-04-20 09:05:00 | [diff] [blame] | 545 | g_network_service_remote->QueryVersion(base::BindOnce( |
Clark DuVall | 984239a | 2019-08-08 23:38:33 | [diff] [blame] | 546 | [](base::Time start_time, uint32_t) { |
| 547 | g_network_service_is_responding = true; |
| 548 | base::TimeDelta delta = base::Time::Now() - start_time; |
| 549 | UMA_HISTOGRAM_MEDIUM_TIMES("NetworkService.TimeToFirstResponse", |
| 550 | delta); |
| 551 | if (g_last_network_service_crash.is_null()) { |
| 552 | UMA_HISTOGRAM_MEDIUM_TIMES( |
| 553 | "NetworkService.TimeToFirstResponse.OnStartup", delta); |
| 554 | } else { |
| 555 | UMA_HISTOGRAM_MEDIUM_TIMES( |
| 556 | "NetworkService.TimeToFirstResponse.AfterCrash", delta); |
| 557 | } |
| 558 | }, |
| 559 | base::Time::Now())); |
John Abd-El-Malek | d1e2a1c | 2019-02-28 20:01:03 | [diff] [blame] | 560 | |
Robbie McElrath | 35ef967 | 2019-02-13 22:01:59 | [diff] [blame] | 561 | const base::CommandLine* command_line = |
| 562 | base::CommandLine::ForCurrentProcess(); |
John Abd-El-Malek | c134dd8 | 2019-07-31 20:51:44 | [diff] [blame] | 563 | if (command_line->HasSwitch(network::switches::kLogNetLog)) { |
| 564 | base::FilePath log_path = |
| 565 | command_line->GetSwitchValuePath(network::switches::kLogNetLog); |
Cheng Yu | 6e46b4d | 2021-09-02 06:43:08 | [diff] [blame] | 566 | if (log_path.empty()) { |
| 567 | log_path = GetContentClient()->browser()->GetNetLogDefaultDirectory(); |
| 568 | if (!log_path.empty()) |
| 569 | log_path = log_path.Append(FILE_PATH_LITERAL("netlog.json")); |
| 570 | } |
Doug Turner | 0851234 | 2018-09-24 20:54:19 | [diff] [blame] | 571 | |
Matt Menke | 04db81d | 2020-07-29 21:54:58 | [diff] [blame] | 572 | base::File file = NetworkServiceInstancePrivate::BlockingOpenFile( |
John Abd-El-Malek | c134dd8 | 2019-07-31 20:51:44 | [diff] [blame] | 573 | log_path, base::File::FLAG_CREATE_ALWAYS | base::File::FLAG_WRITE); |
| 574 | if (!file.IsValid()) { |
| 575 | LOG(ERROR) << "Failed opening NetLog: " << log_path.value(); |
| 576 | } else { |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 577 | (*g_network_service_remote) |
Matt Menke | 04db81d | 2020-07-29 21:54:58 | [diff] [blame] | 578 | ->StartNetLog( |
| 579 | std::move(file), |
| 580 | GetNetCaptureModeFromCommandLine(*command_line), |
| 581 | GetContentClient()->browser()->GetNetLogConstants()); |
Robbie McElrath | 35ef967 | 2019-02-13 22:01:59 | [diff] [blame] | 582 | } |
Robbie McElrath | d063ed0 | 2019-02-13 21:59:30 | [diff] [blame] | 583 | } |
Robbie McElrath | d063ed0 | 2019-02-13 21:59:30 | [diff] [blame] | 584 | |
David Benjamin | 88715385 | 2019-08-07 23:19:55 | [diff] [blame] | 585 | base::FilePath ssl_key_log_path; |
Robbie McElrath | 35ef967 | 2019-02-13 22:01:59 | [diff] [blame] | 586 | if (command_line->HasSwitch(network::switches::kSSLKeyLogFile)) { |
Christopher Thompson | 2a4c69e9 | 2019-08-21 16:29:11 | [diff] [blame] | 587 | UMA_HISTOGRAM_ENUMERATION(kSSLKeyLogFileHistogram, |
| 588 | SSLKeyLogFileAction::kSwitchFound); |
David Benjamin | 88715385 | 2019-08-07 23:19:55 | [diff] [blame] | 589 | ssl_key_log_path = |
Robbie McElrath | 35ef967 | 2019-02-13 22:01:59 | [diff] [blame] | 590 | command_line->GetSwitchValuePath(network::switches::kSSLKeyLogFile); |
David Benjamin | 88715385 | 2019-08-07 23:19:55 | [diff] [blame] | 591 | LOG_IF(WARNING, ssl_key_log_path.empty()) |
Robbie McElrath | 35ef967 | 2019-02-13 22:01:59 | [diff] [blame] | 592 | << "ssl-key-log-file argument missing"; |
David Benjamin | 88715385 | 2019-08-07 23:19:55 | [diff] [blame] | 593 | } else { |
| 594 | std::unique_ptr<base::Environment> env(base::Environment::Create()); |
| 595 | std::string env_str; |
| 596 | if (env->GetVar("SSLKEYLOGFILE", &env_str)) { |
Christopher Thompson | 2a4c69e9 | 2019-08-21 16:29:11 | [diff] [blame] | 597 | UMA_HISTOGRAM_ENUMERATION(kSSLKeyLogFileHistogram, |
| 598 | SSLKeyLogFileAction::kEnvVarFound); |
Xiaohan Wang | 1ecfd00 | 2022-01-19 22:33:10 | [diff] [blame] | 599 | #if BUILDFLAG(IS_WIN) |
David Benjamin | 88715385 | 2019-08-07 23:19:55 | [diff] [blame] | 600 | // base::Environment returns environment variables in UTF-8 on |
| 601 | // Windows. |
Peter Kasting | 57fd6de4 | 2021-01-28 23:05:39 | [diff] [blame] | 602 | ssl_key_log_path = base::FilePath(base::UTF8ToWide(env_str)); |
David Benjamin | 88715385 | 2019-08-07 23:19:55 | [diff] [blame] | 603 | #else |
| 604 | ssl_key_log_path = base::FilePath(env_str); |
| 605 | #endif |
| 606 | } |
Robbie McElrath | 35ef967 | 2019-02-13 22:01:59 | [diff] [blame] | 607 | } |
Robbie McElrath | d063ed0 | 2019-02-13 21:59:30 | [diff] [blame] | 608 | |
David Benjamin | 88715385 | 2019-08-07 23:19:55 | [diff] [blame] | 609 | if (!ssl_key_log_path.empty()) { |
Matt Menke | 04db81d | 2020-07-29 21:54:58 | [diff] [blame] | 610 | base::File file = NetworkServiceInstancePrivate::BlockingOpenFile( |
| 611 | ssl_key_log_path, |
| 612 | base::File::FLAG_OPEN_ALWAYS | base::File::FLAG_APPEND); |
David Benjamin | 88715385 | 2019-08-07 23:19:55 | [diff] [blame] | 613 | if (!file.IsValid()) { |
| 614 | LOG(ERROR) << "Failed opening SSL key log file: " |
| 615 | << ssl_key_log_path.value(); |
| 616 | } else { |
Christopher Thompson | 2a4c69e9 | 2019-08-21 16:29:11 | [diff] [blame] | 617 | UMA_HISTOGRAM_ENUMERATION(kSSLKeyLogFileHistogram, |
| 618 | SSLKeyLogFileAction::kLogFileEnabled); |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 619 | (*g_network_service_remote)->SetSSLKeyLogFile(std::move(file)); |
David Benjamin | 88715385 | 2019-08-07 23:19:55 | [diff] [blame] | 620 | } |
Robbie McElrath | 35ef967 | 2019-02-13 22:01:59 | [diff] [blame] | 621 | } |
Doug Turner | 0851234 | 2018-09-24 20:54:19 | [diff] [blame] | 622 | |
Chris Fredrickson | a2092c9b | 2022-05-09 21:54:12 | [diff] [blame] | 623 | if (FirstPartySetsHandlerImpl::GetInstance()->IsEnabled()) { |
Chris Fredrickson | ed87d8e | 2022-08-17 18:30:10 | [diff] [blame] | 624 | if (absl::optional<network::mojom::PublicFirstPartySetsPtr> sets = |
Chris Fredrickson | a2092c9b | 2022-05-09 21:54:12 | [diff] [blame] | 625 | FirstPartySetsHandlerImpl::GetInstance()->GetSets( |
| 626 | base::BindOnce( |
Chris Fredrickson | ed87d8e | 2022-08-17 18:30:10 | [diff] [blame] | 627 | [](network::mojom::PublicFirstPartySetsPtr sets) { |
Chris Fredrickson | a2092c9b | 2022-05-09 21:54:12 | [diff] [blame] | 628 | GetNetworkService()->SetFirstPartySets( |
| 629 | std::move(sets)); |
| 630 | })); |
| 631 | sets.has_value()) { |
| 632 | g_network_service_remote->get()->SetFirstPartySets( |
| 633 | std::move(sets.value())); |
| 634 | } |
cfredric | 76329042 | 2022-03-31 23:00:33 | [diff] [blame] | 635 | } |
Shuran Huang | 10398150 | 2022-03-28 21:52:18 | [diff] [blame] | 636 | |
Robbie McElrath | 35ef967 | 2019-02-13 22:01:59 | [diff] [blame] | 637 | GetContentClient()->browser()->OnNetworkServiceCreated( |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 638 | g_network_service_remote->get()); |
John Abd-El-Malek | 1ae9dbb | 2019-03-04 23:40:47 | [diff] [blame] | 639 | } |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 640 | } |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 641 | return g_network_service_remote->get(); |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 642 | } |
| 643 | |
Peter Kasting | 7ba9440c | 2020-11-22 01:49:02 | [diff] [blame] | 644 | base::CallbackListSubscription RegisterNetworkServiceCrashHandler( |
| 645 | base::RepeatingClosure handler) { |
Lukasz Anforowicz | ce4487b7 | 2018-10-23 18:05:53 | [diff] [blame] | 646 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 647 | DCHECK(!handler.is_null()); |
| 648 | |
John Abd-El-Malek | c134dd8 | 2019-07-31 20:51:44 | [diff] [blame] | 649 | return GetCrashHandlersList().Add(std::move(handler)); |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 650 | } |
| 651 | |
Eriko Kurimoto | 6465646 | 2022-07-21 01:07:49 | [diff] [blame] | 652 | #if BUILDFLAG(IS_CHROMEOS) |
Robbie McElrath | 995a2bf | 2018-11-19 23:21:59 | [diff] [blame] | 653 | net::NetworkChangeNotifier* GetNetworkChangeNotifier() { |
| 654 | return BrowserMainLoop::GetInstance()->network_change_notifier(); |
| 655 | } |
John Abd-El-Malek | 0343895 | 2019-05-16 22:53:51 | [diff] [blame] | 656 | #endif |
Robbie McElrath | 995a2bf | 2018-11-19 23:21:59 | [diff] [blame] | 657 | |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 658 | void FlushNetworkServiceInstanceForTesting() { |
| 659 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 660 | |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 661 | if (g_network_service_remote) |
| 662 | g_network_service_remote->FlushForTesting(); |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 663 | } |
| 664 | |
Robbie McElrath | f961dc5 | 2018-08-08 21:29:26 | [diff] [blame] | 665 | network::NetworkConnectionTracker* GetNetworkConnectionTracker() { |
Andrew Paseltiner | 82a1f89f | 2022-02-28 21:59:36 | [diff] [blame] | 666 | DCHECK(!BrowserThread::IsThreadInitialized(BrowserThread::UI) || |
| 667 | BrowserThread::CurrentlyOn(BrowserThread::UI)); |
Robbie McElrath | f961dc5 | 2018-08-08 21:29:26 | [diff] [blame] | 668 | if (!g_network_connection_tracker) { |
| 669 | g_network_connection_tracker = new network::NetworkConnectionTracker( |
Gyuyoung Kim | 5f3bd420 | 2019-09-27 01:59:49 | [diff] [blame] | 670 | base::BindRepeating(&BindNetworkChangeManagerReceiver)); |
Robbie McElrath | f961dc5 | 2018-08-08 21:29:26 | [diff] [blame] | 671 | } |
| 672 | return g_network_connection_tracker; |
| 673 | } |
| 674 | |
Robbie McElrath | f633990e | 2018-10-02 21:44:48 | [diff] [blame] | 675 | void GetNetworkConnectionTrackerFromUIThread( |
| 676 | base::OnceCallback<void(network::NetworkConnectionTracker*)> callback) { |
Gabriel Charette | e7cdc5cd | 2020-05-27 23:35:05 | [diff] [blame] | 677 | GetUIThreadTaskRunner({base::TaskPriority::BEST_EFFORT}) |
| 678 | ->PostTaskAndReplyWithResult(FROM_HERE, |
| 679 | base::BindOnce(&GetNetworkConnectionTracker), |
| 680 | std::move(callback)); |
Robbie McElrath | f633990e | 2018-10-02 21:44:48 | [diff] [blame] | 681 | } |
| 682 | |
Jun Cai | 597752e4 | 2018-11-15 19:54:25 | [diff] [blame] | 683 | network::NetworkConnectionTrackerAsyncGetter |
| 684 | CreateNetworkConnectionTrackerAsyncGetter() { |
| 685 | return base::BindRepeating(&content::GetNetworkConnectionTrackerFromUIThread); |
| 686 | } |
| 687 | |
Robbie McElrath | f961dc5 | 2018-08-08 21:29:26 | [diff] [blame] | 688 | void SetNetworkConnectionTrackerForTesting( |
| 689 | network::NetworkConnectionTracker* network_connection_tracker) { |
Andrew Paseltiner | 82a1f89f | 2022-02-28 21:59:36 | [diff] [blame] | 690 | DCHECK(!BrowserThread::IsThreadInitialized(BrowserThread::UI) || |
| 691 | BrowserThread::CurrentlyOn(BrowserThread::UI)); |
Robbie McElrath | db12d8e | 2018-09-18 21:20:40 | [diff] [blame] | 692 | if (g_network_connection_tracker != network_connection_tracker) { |
| 693 | DCHECK(!g_network_connection_tracker || !network_connection_tracker); |
| 694 | g_network_connection_tracker = network_connection_tracker; |
| 695 | } |
Robbie McElrath | f961dc5 | 2018-08-08 21:29:26 | [diff] [blame] | 696 | } |
| 697 | |
Alexander Timin | 7ab3ed8 | 2020-01-13 20:00:13 | [diff] [blame] | 698 | const scoped_refptr<base::SequencedTaskRunner>& GetNetworkTaskRunner() { |
Clark DuVall | b9924e9 | 2018-12-10 23:36:33 | [diff] [blame] | 699 | DCHECK(IsInProcessNetworkService()); |
Alexander Timin | 7ab3ed8 | 2020-01-13 20:00:13 | [diff] [blame] | 700 | return GetNetworkTaskRunnerStorage(); |
Clark DuVall | b9924e9 | 2018-12-10 23:36:33 | [diff] [blame] | 701 | } |
| 702 | |
John Abd-El-Malek | 984dc00 | 2019-05-29 01:26:59 | [diff] [blame] | 703 | void ForceCreateNetworkServiceDirectlyForTesting() { |
| 704 | g_force_create_network_service_directly = true; |
| 705 | } |
| 706 | |
| 707 | void ResetNetworkServiceForTesting() { |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 708 | ShutDownNetworkService(); |
| 709 | } |
| 710 | |
| 711 | void ShutDownNetworkService() { |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 712 | delete g_network_service_remote; |
| 713 | g_network_service_remote = nullptr; |
Sebastien Marchand | 0d68f75a | 2020-07-20 15:39:27 | [diff] [blame] | 714 | delete g_client; |
| 715 | g_client = nullptr; |
Ken Rockot | 7ff141d | 2019-11-01 21:09:44 | [diff] [blame] | 716 | if (g_in_process_instance) { |
| 717 | GetNetworkTaskRunner()->DeleteSoon(FROM_HERE, g_in_process_instance); |
| 718 | g_in_process_instance = nullptr; |
| 719 | } |
Ken Rockot | 91216c0f | 2019-10-11 20:38:11 | [diff] [blame] | 720 | GetNetworkTaskRunnerStorage().reset(); |
John Abd-El-Malek | 984dc00 | 2019-05-29 01:26:59 | [diff] [blame] | 721 | } |
| 722 | |
Clark DuVall | b026e58 | 2019-07-31 19:50:38 | [diff] [blame] | 723 | NetworkServiceAvailability GetNetworkServiceAvailability() { |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 724 | if (!g_network_service_remote) |
Clark DuVall | b026e58 | 2019-07-31 19:50:38 | [diff] [blame] | 725 | return NetworkServiceAvailability::NOT_CREATED; |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 726 | else if (!g_network_service_remote->is_bound()) |
Clark DuVall | b026e58 | 2019-07-31 19:50:38 | [diff] [blame] | 727 | return NetworkServiceAvailability::NOT_BOUND; |
Julie Jeongeun Kim | a3471c6 | 2019-10-15 07:09:24 | [diff] [blame] | 728 | else if (!g_network_service_remote->is_connected()) |
Clark DuVall | b026e58 | 2019-07-31 19:50:38 | [diff] [blame] | 729 | return NetworkServiceAvailability::ENCOUNTERED_ERROR; |
| 730 | else if (!g_network_service_is_responding) |
| 731 | return NetworkServiceAvailability::NOT_RESPONDING; |
| 732 | else |
| 733 | return NetworkServiceAvailability::AVAILABLE; |
| 734 | } |
| 735 | |
| 736 | base::TimeDelta GetTimeSinceLastNetworkServiceCrash() { |
| 737 | if (g_last_network_service_crash.is_null()) |
| 738 | return base::TimeDelta(); |
| 739 | return base::Time::Now() - g_last_network_service_crash; |
| 740 | } |
| 741 | |
Clark DuVall | 1f94e9f4 | 2019-08-21 04:09:36 | [diff] [blame] | 742 | void PingNetworkService(base::OnceClosure closure) { |
| 743 | GetNetworkService(); |
| 744 | // Unfortunately, QueryVersion requires a RepeatingCallback. |
Jan Wilken Dörrie | 8c74db02 | 2020-04-20 09:05:00 | [diff] [blame] | 745 | g_network_service_remote->QueryVersion(base::BindOnce( |
Clark DuVall | 1f94e9f4 | 2019-08-21 04:09:36 | [diff] [blame] | 746 | [](base::OnceClosure closure, uint32_t) { |
| 747 | if (closure) |
| 748 | std::move(closure).Run(); |
| 749 | }, |
Daniel Cheng | 28a5ac48 | 2021-02-22 21:03:08 | [diff] [blame] | 750 | std::move(closure))); |
Clark DuVall | 1f94e9f4 | 2019-08-21 04:09:36 | [diff] [blame] | 751 | } |
| 752 | |
Matthew Denton | 03c45a2 | 2020-06-01 23:40:48 | [diff] [blame] | 753 | namespace { |
| 754 | |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 755 | cert_verifier::mojom::CertVerifierServiceFactory* |
| 756 | g_cert_verifier_service_factory_for_testing = nullptr; |
| 757 | |
Matthew Denton | 03c45a2 | 2020-06-01 23:40:48 | [diff] [blame] | 758 | mojo::PendingRemote<cert_verifier::mojom::CertVerifierService> |
| 759 | GetNewCertVerifierServiceRemote( |
| 760 | cert_verifier::mojom::CertVerifierServiceFactory* |
| 761 | cert_verifier_service_factory, |
Matthew Denton | 6f6ca6ac | 2021-02-18 09:00:35 | [diff] [blame] | 762 | cert_verifier::mojom::CertVerifierCreationParamsPtr creation_params) { |
Matthew Denton | 03c45a2 | 2020-06-01 23:40:48 | [diff] [blame] | 763 | mojo::PendingRemote<cert_verifier::mojom::CertVerifierService> |
| 764 | cert_verifier_remote; |
| 765 | cert_verifier_service_factory->GetNewCertVerifier( |
| 766 | cert_verifier_remote.InitWithNewPipeAndPassReceiver(), |
| 767 | std::move(creation_params)); |
| 768 | return cert_verifier_remote; |
| 769 | } |
| 770 | |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 771 | void RunInProcessCertVerifierServiceFactory( |
Matthew Denton | b6730bf | 2020-06-25 04:54:11 | [diff] [blame] | 772 | mojo::PendingReceiver<cert_verifier::mojom::CertVerifierServiceFactory> |
| 773 | receiver) { |
Michael Ershov | cbdb820 | 2022-02-21 19:17:01 | [diff] [blame] | 774 | #if BUILDFLAG(IS_CHROMEOS) |
| 775 | // See the comment in GetCertVerifierServiceFactory() for the thread-affinity |
| 776 | // of the CertVerifierService. |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 777 | DCHECK(!BrowserThread::IsThreadInitialized(BrowserThread::IO) || |
| 778 | BrowserThread::CurrentlyOn(BrowserThread::IO)); |
| 779 | #else |
| 780 | DCHECK(!BrowserThread::IsThreadInitialized(BrowserThread::UI) || |
| 781 | BrowserThread::CurrentlyOn(BrowserThread::UI)); |
| 782 | #endif |
Avi Drissman | ded7717 | 2021-07-02 18:23:00 | [diff] [blame] | 783 | static base::SequenceLocalStorageSlot< |
| 784 | std::unique_ptr<cert_verifier::CertVerifierServiceFactoryImpl>> |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 785 | service_factory_slot; |
Avi Drissman | ded7717 | 2021-07-02 18:23:00 | [diff] [blame] | 786 | service_factory_slot.GetOrCreateValue() = |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 787 | std::make_unique<cert_verifier::CertVerifierServiceFactoryImpl>( |
| 788 | std::move(receiver)); |
Matthew Denton | b6730bf | 2020-06-25 04:54:11 | [diff] [blame] | 789 | } |
| 790 | |
Matthew Denton | 03c45a2 | 2020-06-01 23:40:48 | [diff] [blame] | 791 | // Owns the CertVerifierServiceFactory used by the browser. |
| 792 | // Lives on the UI thread. |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 793 | mojo::Remote<cert_verifier::mojom::CertVerifierServiceFactory>& |
| 794 | GetCertVerifierServiceFactoryRemoteStorage() { |
Avi Drissman | ded7717 | 2021-07-02 18:23:00 | [diff] [blame] | 795 | static base::SequenceLocalStorageSlot< |
| 796 | mojo::Remote<cert_verifier::mojom::CertVerifierServiceFactory>> |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 797 | cert_verifier_service_factory_remote; |
Avi Drissman | ded7717 | 2021-07-02 18:23:00 | [diff] [blame] | 798 | return cert_verifier_service_factory_remote.GetOrCreateValue(); |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 799 | } |
Matthew Denton | 03c45a2 | 2020-06-01 23:40:48 | [diff] [blame] | 800 | |
Hubert Chao | 2a000d7 | 2022-04-25 19:43:30 | [diff] [blame] | 801 | } // namespace |
| 802 | |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 803 | // Returns a pointer to a CertVerifierServiceFactory usable on the UI thread. |
| 804 | cert_verifier::mojom::CertVerifierServiceFactory* |
| 805 | GetCertVerifierServiceFactory() { |
Hubert Chao | 2a000d7 | 2022-04-25 19:43:30 | [diff] [blame] | 806 | DCHECK(!BrowserThread::IsThreadInitialized(BrowserThread::UI) || |
| 807 | BrowserThread::CurrentlyOn(BrowserThread::UI)); |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 808 | if (g_cert_verifier_service_factory_for_testing) |
| 809 | return g_cert_verifier_service_factory_for_testing; |
Yuki Yamada | 709edde | 2020-11-24 05:47:21 | [diff] [blame] | 810 | |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 811 | mojo::Remote<cert_verifier::mojom::CertVerifierServiceFactory>& |
| 812 | factory_remote_storage = GetCertVerifierServiceFactoryRemoteStorage(); |
| 813 | if (!factory_remote_storage.is_bound() || |
| 814 | !factory_remote_storage.is_connected()) { |
| 815 | factory_remote_storage.reset(); |
Michael Ershov | cbdb820 | 2022-02-21 19:17:01 | [diff] [blame] | 816 | #if BUILDFLAG(IS_CHROMEOS) |
| 817 | // In-process CertVerifierService in Ash and Lacros should run on the IO |
| 818 | // thread because it interacts with IO-bound NSS and ChromeOS user slots. |
| 819 | // See for example InitializeNSSForChromeOSUser() or |
| 820 | // CertDbInitializerIOImpl. |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 821 | GetIOThreadTaskRunner({})->PostTask( |
| 822 | FROM_HERE, |
| 823 | base::BindOnce(&RunInProcessCertVerifierServiceFactory, |
| 824 | factory_remote_storage.BindNewPipeAndPassReceiver())); |
Yuki Yamada | 709edde | 2020-11-24 05:47:21 | [diff] [blame] | 825 | #else |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 826 | RunInProcessCertVerifierServiceFactory( |
| 827 | factory_remote_storage.BindNewPipeAndPassReceiver()); |
Yuki Yamada | 709edde | 2020-11-24 05:47:21 | [diff] [blame] | 828 | #endif |
Yuki Yamada | 709edde | 2020-11-24 05:47:21 | [diff] [blame] | 829 | } |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 830 | return factory_remote_storage.get(); |
| 831 | } |
Matthew Denton | 03c45a2 | 2020-06-01 23:40:48 | [diff] [blame] | 832 | |
Matthew Denton | 82c211f | 2021-02-06 01:58:54 | [diff] [blame] | 833 | network::mojom::CertVerifierServiceRemoteParamsPtr GetCertVerifierParams( |
Matthew Denton | 6f6ca6ac | 2021-02-18 09:00:35 | [diff] [blame] | 834 | cert_verifier::mojom::CertVerifierCreationParamsPtr |
Matthew Denton | 03c45a2 | 2020-06-01 23:40:48 | [diff] [blame] | 835 | cert_verifier_creation_params) { |
Matthew Denton | 82c211f | 2021-02-06 01:58:54 | [diff] [blame] | 836 | return network::mojom::CertVerifierServiceRemoteParams::New( |
| 837 | GetNewCertVerifierServiceRemote( |
| 838 | GetCertVerifierServiceFactory(), |
| 839 | std::move(cert_verifier_creation_params))); |
Matthew Denton | 03c45a2 | 2020-06-01 23:40:48 | [diff] [blame] | 840 | } |
| 841 | |
| 842 | void SetCertVerifierServiceFactoryForTesting( |
| 843 | cert_verifier::mojom::CertVerifierServiceFactory* service_factory) { |
Matthew Denton | 1d7839c | 2020-11-27 04:59:23 | [diff] [blame] | 844 | g_cert_verifier_service_factory_for_testing = service_factory; |
Matthew Denton | 03c45a2 | 2020-06-01 23:40:48 | [diff] [blame] | 845 | } |
| 846 | |
Kevin Marshall | eece67f | 2022-03-30 20:30:04 | [diff] [blame] | 847 | void MaybeCleanCacheDirectory(network::mojom::NetworkContextParams* params) { |
| 848 | if (params->http_cache_enabled && params->http_cache_directory) { |
| 849 | // Delete any old data except for the "Cache_Data" directory. |
| 850 | base::ThreadPool::PostTask( |
| 851 | FROM_HERE, |
| 852 | {base::TaskPriority::BEST_EFFORT, base::MayBlock(), |
| 853 | base::TaskShutdownBehavior::CONTINUE_ON_SHUTDOWN}, |
| 854 | base::BindOnce(MaybeDeleteOldCache, |
| 855 | params->http_cache_directory->path())); |
| 856 | |
| 857 | params->http_cache_directory = |
| 858 | params->http_cache_directory->path().Append(kCacheDataDirectoryName); |
| 859 | } |
| 860 | } |
| 861 | |
Will Harris | a6a750b | 2021-07-14 03:12:02 | [diff] [blame] | 862 | void CreateNetworkContextInNetworkService( |
| 863 | mojo::PendingReceiver<network::mojom::NetworkContext> context, |
| 864 | network::mojom::NetworkContextParamsPtr params) { |
Egor Pasko | 75389f1 | 2022-03-22 16:09:11 | [diff] [blame] | 865 | TRACE_EVENT0("loading", "CreateNetworkContextInNetworkService"); |
Will Harris | dac11fb | 2021-09-08 02:21:41 | [diff] [blame] | 866 | DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); |
Kevin Marshall | eece67f | 2022-03-30 20:30:04 | [diff] [blame] | 867 | |
| 868 | MaybeCleanCacheDirectory(params.get()); |
| 869 | |
Yutaka Hirano | 92bdfa2 | 2022-06-01 15:51:33 | [diff] [blame] | 870 | const bool has_valid_http_cache_path = |
| 871 | params->http_cache_enabled && params->http_cache_directory && |
| 872 | !params->http_cache_directory->path().empty(); |
| 873 | const bool brokering_is_enabled = |
| 874 | IsOutOfProcessNetworkService() && |
| 875 | base::FeatureList::IsEnabled( |
| 876 | features::kBrokerFileOperationsOnDiskCacheInNetworkService); |
| 877 | if (has_valid_http_cache_path && brokering_is_enabled) { |
Yutaka Hirano | de9868f | 2022-04-27 02:48:44 | [diff] [blame] | 878 | mojo::MakeSelfOwnedReceiver( |
| 879 | std::make_unique<HttpCacheBackendFileOperationsFactory>( |
| 880 | params->http_cache_directory->path()), |
| 881 | params->http_cache_file_operations_factory |
| 882 | .InitWithNewPipeAndPassReceiver()); |
| 883 | } |
| 884 | |
Will Harris | 7bcc528 | 2022-07-29 00:51:03 | [diff] [blame] | 885 | #if BUILDFLAG(IS_ANDROID) |
Will Harris | b57cfc56 | 2022-05-27 19:51:51 | [diff] [blame] | 886 | // On Android, if a cookie_manager pending receiver was passed then migration |
| 887 | // should not be attempted as the cookie file is already being accessed by the |
| 888 | // browser instance. |
| 889 | if (params->cookie_manager) { |
| 890 | if (params->file_paths) { |
| 891 | // No migration should ever be attempted under this configuration. |
| 892 | DCHECK(!params->file_paths->unsandboxed_data_path); |
| 893 | } |
| 894 | CreateNetworkContextInternal( |
| 895 | std::move(context), std::move(params), |
| 896 | SandboxGrantResult::kDidNotAttemptToGrantSandboxAccess); |
| 897 | return; |
| 898 | } |
| 899 | |
| 900 | // Note: This logic is duplicated from MaybeGrantAccessToDataPath to this fast |
| 901 | // path. This should be kept in sync if there are any changes to the logic. |
| 902 | SandboxGrantResult grant_result = SandboxGrantResult::kNoMigrationRequested; |
| 903 | if (!params->file_paths) { |
| 904 | // No file paths (e.g. in-memory context) so nothing to do. |
| 905 | grant_result = SandboxGrantResult::kDidNotAttemptToGrantSandboxAccess; |
| 906 | } else { |
| 907 | // If no `unsandboxed_data_path` is supplied, it means this is network |
| 908 | // context has been created by Android Webview, which does not understand |
| 909 | // the concept of `unsandboxed_data_path`. In this case, `data_directory` |
| 910 | // should always be used, if present. |
| 911 | if (!params->file_paths->unsandboxed_data_path) |
| 912 | grant_result = SandboxGrantResult::kDidNotAttemptToGrantSandboxAccess; |
| 913 | } |
Egor Pasko | 75389f1 | 2022-03-22 16:09:11 | [diff] [blame] | 914 | // Create network context immediately without thread hops. |
Will Harris | b57cfc56 | 2022-05-27 19:51:51 | [diff] [blame] | 915 | CreateNetworkContextInternal(std::move(context), std::move(params), |
| 916 | grant_result); |
Egor Pasko | 75389f1 | 2022-03-22 16:09:11 | [diff] [blame] | 917 | #else |
| 918 | // Restrict disk access to a certain path (on another thread) and continue |
| 919 | // with network context creation. |
| 920 | GrantSandboxAccessOnThreadPool( |
| 921 | std::move(params), |
| 922 | base::BindOnce(&CreateNetworkContextInternal, std::move(context))); |
Xiaohan Wang | 1ecfd00 | 2022-01-19 22:33:10 | [diff] [blame] | 923 | #endif // BUILDFLAG(IS_ANDROID) |
Will Harris | a6a750b | 2021-07-14 03:12:02 | [diff] [blame] | 924 | } |
| 925 | |
Will Harris | f26ad34 | 2022-09-06 02:03:28 | [diff] [blame] | 926 | #if BUILDFLAG(IS_WIN) |
| 927 | |
| 928 | void SetNetworkServiceTrackerToCurrentProcessForTesting() { |
| 929 | internal::SetNetworkServiceTrackerToCurrentProcessForTesting(); |
| 930 | } |
| 931 | |
| 932 | #endif // BUILDFLAG(IS_WIN) |
| 933 | |
John Abd-El-Malek | deec008 | 2017-12-20 20:47:47 | [diff] [blame] | 934 | } // namespace content |